Matias Eissler (@tutterr) 's Twitter Profile
Matias Eissler

@tutterr

@[email protected]

ID: 47422417

calendar_today15-06-2009 19:39:17

523 Tweet

244 Followers

189 Following

Grant Sanderson (@3blue1brown) 's Twitter Profile Photo

The Fourier series video out! In this animation, each vector rotates at a constant integer frequency. They're added together, tip to tail. The _only_ control you have is the starting position of each, and from that alone, they'll draw almost anything. youtu.be/r6sGWTCMz2k

Brandon Falk (@gamozolabs) 's Twitter Profile Photo

1.85 terahertz of 6502 emulation power? ASAN-style memory checking for your critical 6502 software? Vectorized Emulation: 6502 Edition is here to save the day! youtube.com/watch?v=zl4H4E…

Hekapoo (@hekapoo___) 's Twitter Profile Photo

Published a collection of all the Apple bootroms I got - both for AP (application processor) and SEP (Secure Enclave), including very rare ones dumped from early prototypes securerom.fun

Published a collection of all the Apple bootroms I got - both for AP (application processor) and SEP (Secure Enclave), including very rare ones dumped from early prototypes

securerom.fun
iFenix (@dlymension) 's Twitter Profile Photo

UTM - Virtual Machines for iOS..!! 🔥🔥 Windows 7 Demonstration on iPad. Github : github.com/utmapp/UTM UTM is a full featured virtual machine host for iOS. In short, it allows you to run Windows, Android, and more on your iPhone and iPad.

ProyectoRespirAr2020 (@respirar2020) 's Twitter Profile Photo

Convocatoria de EQUIPO #ProyectoRespirAR. Nuestro objetivo, desarrollo de un equipo de ventilación mecánica seguro #opensource, fácilmente replicable y de bajo costo. Se parte del equipo de ProyectoRespirAr2020. docs.google.com/forms/d/e/1FAI…

Convocatoria de EQUIPO #ProyectoRespirAR. Nuestro objetivo, desarrollo de un equipo de ventilación mecánica seguro #opensource, fácilmente replicable y de bajo costo. Se parte del equipo de <a href="/RespirAr2020/">ProyectoRespirAr2020</a>. 
docs.google.com/forms/d/e/1FAI…
Misha Davidov 🏳️‍⚧️ (@sirus) 's Twitter Profile Photo

We turned a Radeon GPU's shader clock in to a tunable radio transmitter that can jump through walls & get picked up 50ft away. Get your Van Eck fill and learn how to find these and other RF side-channels from myself and Baron Von Oldenburg of Duo Labs! duo.com/labs/research/…

LimitedResults (@limitedresults) 's Twitter Profile Photo

🔥Resurrection of the nRF52 Debug Interface 🔥 Allow PERMANENT debug capabilities on the target. All nRF52 are impacted. No fix except Silicon revision. 💁‍♂️ Part 1: limitedresults.com/2020/06/nrf52-… #nRF52 #ARM #NordicSemiconductor

🔥Resurrection of the nRF52 Debug Interface 🔥
Allow PERMANENT debug capabilities on the target.
All nRF52 are impacted. No fix except Silicon revision. 💁‍♂️

Part 1:
limitedresults.com/2020/06/nrf52-…

#nRF52 #ARM #NordicSemiconductor
Jay Freeman (saurik) (@saurik) 's Twitter Profile Photo

Last week, I discovered (and reported) a critical bug (which has been fully patched) in (Deprecated) Optimism ✨🔴✨ (a "layer 2 scaling solution" for Ethereum) that would have allowed an attacker to print arbitrary quantity of tokens, for which I won a $2,000,042 bounty. saurik.com/optimism.html

Jiska (@naehrdine) 's Twitter Profile Photo

When your iPhone is turned off, the Bluetooth, NFC and UWB chips might stay on and interact. This enables Find My and Express Cards and Keys, including the UWB-based Digital Car Key 3.0. What does this mean to security and privacy? Find out in our paper: arxiv.org/abs/2205.06114

When your iPhone is turned off, the Bluetooth, NFC and UWB chips might stay on and interact. This enables Find My and Express Cards and Keys, including the UWB-based Digital Car Key 3.0.

What does this mean to security and privacy? Find out in our paper: arxiv.org/abs/2205.06114
Joseph Ravichandran (@0xjprx) 's Twitter Profile Photo

We found a way to defeat pointer authentication (and forge kernel pointers from userspace) on the Apple M1 via a new hardware attack. Here’s how it works- pacmanattack.com

Mathy Vanhoef (@vanhoefm) 's Twitter Profile Photo

Good post about exploiting the Wi-Fi stack in a Tesla Model S (2020). First exploits the Wi-Fi firmware, then the host. Firmware vulnerability is the 802.11e (WMM) functionality when handling ADDTS and TSPEC frames, host vulnerability in the driver. keenlab.tencent.com/en/2020/01/02/…

Science Is Strategic (@scienceisstrat1) 's Twitter Profile Photo

2/ The eight warmest years on record have now all occurred since 2014, with average temperatures globally around 1.2°C higher last year than pre-industrial times nytimes.com/interactive/20…

2/  The eight warmest years on record have now all occurred since 2014, with average temperatures globally around 1.2°C higher last year than pre-industrial times

nytimes.com/interactive/20…
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Excellent research work for anyone interested in Wi-Fi security MiTM by exploiting cross-layer interactions between WPAs and ICMP csis.gmu.edu/ksun/publicati… #wifi #infosec #cybersecurity #wireless

Excellent research work for anyone interested in Wi-Fi security
MiTM by exploiting cross-layer interactions between WPAs and ICMP

csis.gmu.edu/ksun/publicati…

#wifi #infosec #cybersecurity #wireless